On the security of two improved authenticated encryption schemes

被引:0
|
作者
Informatics Department, Electronics Research Institute, Cairo, Egypt [1 ]
机构
来源
Int. J. Secur. Netw. | 2013年 / 4卷 / 194-199期
关键词
D O I
10.1504/IJSN.2013.058112
中图分类号
学科分类号
摘要
18
引用
收藏
相关论文
共 50 条
  • [1] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [2] Security Analysis of Two Authenticated Encryption Schemes
    Zhang, Jianhong
    Geng, Qin
    [J]. 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163
  • [3] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [4] On the Related-Key Attack Security of Authenticated Encryption Schemes
    Faust, Sebastian
    Kraemer, Juliane
    Orlt, Maximilian
    Struck, Patrick
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 362 - 386
  • [5] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [6] Cryptanalysis and improvement of two convertible authenticated encryption schemes
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    不详
    [J]. Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
  • [7] On the Security of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
    Rasslan, Mohamed
    [J]. 4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 : 565 - 569
  • [8] Improved broadcast encryption schemes with enhanced security
    Lishan Ke
    Zongxiang Yi
    Yan Ren
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 121 - 129
  • [9] Improved broadcast encryption schemes with enhanced security
    Ke, Lishan
    Yi, Zongxiang
    Ren, Yan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (01) : 121 - 129
  • [10] TriviA and uTriviA: two fast and secure authenticated encryption schemes
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (01) : 29 - 48